keywords Years Adv Search
33
Announcement
Special Report
Cooperator
Links
2017 Vol. 3, No. 5
Published: 16 May 2017

 
386 Microsoft China: The Implementation of Information Security and Cooperative Strategy
2017 Vol. 3 (5): 386-397 [Abstract] ( 120 ) HTML (1 KB)  PDF  (1668 KB)  ( 155 )
400 Privacy Preserving Cloud Computing—With a Focus on Multimedia Applications
2017 Vol. 3 (5): 400-411 [Abstract] ( 36 ) HTML (1 KB)  PDF  (11157 KB)  ( 37 )
412 Secure Operation Platform for Cloud Service
2017 Vol. 3 (5): 412-417 [Abstract] ( 97 ) HTML (1 KB)  PDF  (5505 KB)  ( 81 )
427 Promoting Information Security Is the Responsibility of the Enterprise
2017 Vol. 3 (5): 427-431 [Abstract] ( 52 ) HTML (1 KB)  PDF  (476 KB)  ( 62 )
432 Study of Security Protection System in Desktop Cloud
2017 Vol. 3 (5): 432-439 [Abstract] ( 44 ) HTML (1 KB)  PDF  (7176 KB)  ( 70 )
440 Trusted Computing: Constructing a New Architecture for Cloud Security
2017 Vol. 3 (5): 440-450 [Abstract] ( 59 ) HTML (1 KB)  PDF  (9099 KB)  ( 74 )
451 A Review on the Technology of Legal Software Protection
Sun Wei
2017 Vol. 3 (5): 451-461 [Abstract] ( 45 ) HTML (1 KB)  PDF  (8338 KB)  ( 57 )
462 A Formal Analysis Method with Forward Reasoning for Cryptographic Protocols
2017 Vol. 3 (5): 462-468 [Abstract] ( 33 ) HTML (1 KB)  PDF  (5238 KB)  ( 89 )
469 Analysis of Host Anomaly Behavior Based on Stream Data Feature Matchinge
Mei-Rong Mei-rongWEI
2017 Vol. 3 (5): 469-476 [Abstract] ( 40 ) HTML (1 KB)  PDF  (6181 KB)  ( 63 )
477 Talking About the Application of the Commercial Cryptography
2017 Vol. 3 (5): 477-480 [Abstract] ( 37 ) HTML (1 KB)  PDF  (723 KB)  ( 107 )
Copyright © Editorial Board of Journal of Information Security Research